Index
IN-33
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
trunk ports
defined 15-4, 17-3
trunks
allowed-VLAN list 17-12, 17-19
load sharing
setting STP path costs 17-13
using STP port priorities 17-13
native VLAN for untagged traffic 17-12, 17-20
parallel 17-13
pruning-eligible list 17-19
to non-DTP device 17-9
trusted boundary for QoS 38-26, 38-34
trusted port states
between QoS domains 38-27, 38-35
classification options 38-10
ensuring port security for IP phones 38-26, 38-34
support for 1-10
within a QoS domain 38-26, 38-33
trustpoints, CA 12-23
twisted-pair Ethernet, detecting unidirectional links 33-1
type of service
See ToS
U
UDLD
default configuration 33-4
echoing detection mechanism 33-3
enabling
globally 33-4
per interface 33-5
link-detection mechanism 33-1
neighbor database 33-2
overview 33-1
resetting an interface 33-5
support for 1-5
UDP jitter operation, IP SLAs 45-5
unauthorized ports with IEEE 802.1x 13-9
unicast MAC address filtering 1-4
and adding static addresses 7-7
and broadcast MAC addresses 7-7
and CPU packets 7-7
and multicast addresses 7-7
and router MAC addresses 7-7
configuration guidelines 7-7
described 7-7
unicast storm 29-1
unicast storm control command 29-9
UNIX syslog servers
daemon configuration 35-4
facilities supported 35-4
message logging configuration 35-10
unrecognized Type-Length-Value (TLV) support 18-5
upgrading software images
See downloading
UplinkFast
described 22-3
uploading
configuration files
preparing A-11, A-13, A-16
reasons for A-9
using FTP A-15
using RCP A-18
using TFTP A-12
image files
preparing A-25, A-28, A-32
reasons for A-23
using FTP A-30
using RCP A-34
using TFTP A-27
user EXEC mode 2-2
username-based authentication 12-4
V
version-dependent transparent mode 18-5
virtual switches and PAgP 40-5
vlan.dat file 17-4